what are two traits of a cloud computing architecture? a. single tiered b. not scalable c. on demand access to resources d. internet/intranet accessible server e. client and server run in the same physical environment

Answers

Answer 1

On demand access to resources & internet/intranet accessible server are two traits of a cloud computing architecture.

What is the architecture of cloud computing?The way technological elements come together to create a cloud, where resources are pooled through virtualization technology and shared over a network, is known as cloud architecture. The elements of a cloud architecture are as follows: an entrance platform (the client or device used to access the cloud)According to the NIST definition, cloud computing must have five key features: on-demand self-service, widespread network access, resource pooling, quick flexibility or growth, and measurable service.Private, public, hybrid, and multiclouds are the four basic subtypes of cloud computing. Infrastructure-as-a-Service (IaaS), platforms-as-a-Service (PaaS), and software-as-a-service are the three primary categories of cloud computing services (SaaS).

Learn more about cloud computing architecture refer to :

https://brainly.com/question/11934271

#SPJ4


Related Questions

What game has a feedback loop that operates like this:

You capture a city, which gives you more resources.
With more resources, you capture more cities.
With more cities, you have a stronger position and (hopefully!) win.

Civilization


Legend of Zelda


Game of Thrones


Grand Theft Auto

Answers

In a civilization, there are resources, and when there are resources, there will inevitably be cities with populations, and when there will be cities, you will be in a stronger position.

What do gaming feedback loops do?

What game features a feedback loop that works as follows;How do feedback loops work? A game system that accepts a game's output and uses it as an input is known as a feedback loop. One of the most well-known instances of a feedback loop is the blue shell in Mario.

Are game loops included in every game?

The main thread for all game rendering threads is the game loop. All current video games contain it.

To know more about feedback loop visit :-

https://brainly.com/question/29189523

#SPJ1

What is malware? What are some signs that malware may be impacting the performance of your computer? How can you avoid malware?

Answers

Answer:

Malware is a type of software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. Malware can be spread through email attachments, online advertisements, websites, and other methods.

Some signs that malware may be impacting the performance of your computer include:

Your computer is running more slowly than usualYour computer crashes frequentlyYour computer has pop-up ads or other unwanted behaviorYour default homepage or search engine has changed without your permissionYou see new icons or programs on your desktop that you didn't install

To avoid malware, you should be cautious when browsing the internet and avoid visiting suspicious websites. You should also avoid opening email attachments from unknown senders, and be wary of online advertisements. You can also protect your computer by using antivirus software and keeping it up to date.

if the search column for a VLOOKUP contains a duplicate value, which value will VLOOKUP return?
a. the value of the last match
b. it will return both values
c. it will return an error (#duplicate), since the research column must be unique
d. the value of the first match

Answers

If the search column for a VLOOKUP contains a duplicate value, a value which VLOOKUP will return is: D. the value of the first match.

What is VLOOKUP function?

A VLOOKUP function can be defined as a type of function that is typically used to look up a value in a specific column in Microsoft Excel. Generally speaking, a VLOOKUP is represented by this syntax in Microsoft Excel;

VLOOKUP(lookup_value, table_array, col_index_num, [range_lookup])

Where:

lookup_value represents the value to be searched in the first column of a spreadsheet.table_array represents the range of cells containing data set.col_index_num represents the column number from which a value can be retrieved.range_lookup represents an optional argument i.e (FALSE) or (TRUE).

In conclusion, a VLOOKUP function would return the value of the first match when the search column contains a duplicate value.

Read more on VLOOKUP here: https://brainly.com/question/16986179

#SPJ4

Select the correct answer. Improving the way you communicate to others by your actions, is to improve which area of effective communication? A. Your speaking skills B. Your listening skills C. Your body language D. None of the above - your actions do not matter when communicating

Answers

It can be inferred that improving the way you communicate with others, through your actions, is improving your body language. The correct option is C.

What is communication?

Communication is generally understood as the transmission of information. In this context, a message is transmitted from a sender to a receiver through a medium such as sound, paper, body movements, or electricity.

To communicate successfully, it's important to understand your body language. It is also beneficial to understand the differences in communication styles for face-to-face encounters, phone conversations, and digital communications such as email and social media. Through your body language, the other person can know if you don't want to take to them.

In conclusion, the correct option is C.

Learn more about communication at:

https://brainly.com/question/12141060

#SPJ1

Write a program that prints the following pattern. You must use a loop to do this and you may not output the pattern manually using print statements. You should use at max 2 print statements. write code for python

Answers

Answer:

there a two loops,

1. for loop

2. while loop

using a for loop

for i in range(6):

   print("* " * i)

for i in range(4, 0, -1):

   print("* " * i)

using a while loop

i = 0

while i < 6:

   print("* " * i)

   i += 1

while i > 0:

   print("* " * i)

   i -= 1

hope this helps!

Write a program that accept a whole number a input, mutiplie that number by 21, and then output the product

Answers

Answer:

while True:

   try:

       whole_number = int(input("Enter a whole number: "))

       break

   except ValueError:

       print("That is not a whole number. Try again.")

product = whole_number * 21

print("The product is", product)

Explanation:

using while true and except ValueError to make sure the user enters a whole number

you have recently bought a new computer system that runs windows 10. you need to dual boot the system with linux, but you are unable to perform it. the system is also having issues with high-end graphics cards. you suspect uefi secure boot to be the reason for it and decide to disable it. how will you accomplish this?

Answers

I will accomplish by :

-Select Advanced Options for Troubleshooting: UEFI Firmware Settings.-Select Restart while holding down the Shift key on the Windows 10 operating system.

What is dual boot used for?Even though the majority of PCs only come with one operating system (OS), it is feasible to run two operating systems simultaneously on a single machine. Dual-booting is a technique that enables users to switch between operating systems based on the tasks and applications they're using.While Safe, Dual Booting Significantly Reduces Disk Space. The CPU won't melt, the DVD drive won't start hurling discs across the room, and your computer won't self-destruct. It does have one significant drawback, though, in that your disc space will be significantly diminished.You may set up a dual boot setup if you want not to replace your existing version of Windows with Windows 10.

Learn more about dual boot refer to :

https://brainly.com/question/13483046

#SPJ4

What term means users cannot change or update the data in data warehouses or data marts?
a. integrated
b. nonvolatile
c. consistent
d. relational

Answers

Answer:

b. nonvolatile

if we put an empty form element on one of our web pages and display that page in a browser, then where the form element is located we see a. an empty box b. two horizontal lines with nothing between them c. some extra vertical spacing d. no visible effect

Answers

if we put an empty form element on one of our web pages and display that page in a browser, then the form element is located we see an empty box

What is web pages ?On the World Wide Web, a web page (also known as a website) is a hypertext document. A web server sends web pages to the user, who then sees them on a web browser.  A website is made up of numerous web pages connected by a common domain name. The term "web page" refers to a collection of paper pages that have been bound into a book.A text file in the HyperText Markup Language (HTML that contains references to other web resources and specifies the content of the web page is the fundamental component of a web page. An organised document called a web page is mostly made up of hypertext, or text with links.

To learn more about web pages refer to:

https://brainly.com/question/28430284

#SPJ4

A way to navigate the internet is by

A. Clicking on a link
B. Typing in a URL
C. Clicking on a search engine result
D. All of the above

Answers

Answer:

D

Explanation:

really ? as internet user you need help with that ?

by the way, C makes the same as A. a search engine result is a link (or a list of links).

you are concerned with the security of a site you use and run a vulnerability test against it. the test reveals a security threat. is this hacking?

Answers

Hacking is the term used to describe the unauthorized or excessive use of computer resources.

Is the common word for malware that infects a user's computer, gathers sensitive data, and then delivers that data to an attacker?

One of the most prevalent risks to internet users is spyware. Once installed, it keeps track of login details, spies on confidential data, and monitors internet activities. Spyware's main objective is typically to collect passwords, banking information, and credit card numbers.

How did the attackers on the target receive the information they took from the target?

In November 2013, the criminals used credentials from a third-party vendor that had been stolen to access Target servers. They then put malware in place to collect information such as names, email addresses, credit card numbers, and more.

to know more about  hacking here:

brainly.com/question/14835601

#SPJ4

your ip address is 192.168.8.34, and your subnet mask is 255.255.0.0. what part of the subnet mask represents the subnet id?

Answers

The part of the subnet mask that represents the subnet id is the last two octets of the subnet mask, 0.0. The correct option is C.

What is a subnet mask?

An IP address is divided into network bits, which identify the network, and host bits, which identify the host device connected to that network, by a subnet mask, which is a 32-bit address.

Each octet in the IP address is distinguished by a 32-bit number. For instance, 255.255.0.0 is a typical Class B subnet mask because the first two bytes (network) and the last two bytes (zeros) are all ones.

Therefore, the correct option is C. The last two octets of the subnet mask, 0.0.

To learn more about subnet masks, refer to the link:

https://brainly.com/question/29507889

#SPJ1

The question is incomplete. Your most probably complete question is given below:

The first two octets of the subnet mask, 255.255

192.168.0.254

The last two octets of the subnet mask, 0.0

255.255.0.1

what is a host with multiple network interfaces, which are often connected to two separate networks.

Answers

You can set up settings where an instance connects directly to a number of VPC networks by using several network interfaces.

What do you mean by multiple network interfaces?You can set up settings where an instance connects directly to a number of VPC networks by using several network interfaces. Depending on the type of instance, there can be up to eight interfaces per instance. See Maximum number of network interfaces for further details.A host has several network interfaces that connect to physically connected networks, but you might want to allocate various network interface choices to distinct activities for routing or performance reasons.We are aware that there are two different sorts of connections that can be used for both analog and digital signals. The distinction between these two connector types is that. While HDMI supports digital transmission, VGA only supports analog transmission.

To learn more about network interfaces refer,

https://brainly.com/question/20689912

#SPJ4

How can you stop a slide show?

Press the right arrow
Press escape
Press left arrow
Press delete

Answers

You press escape to stop a slide show.

fix the code below so it does not leave the loop too early. try the codelens button to see what is going on. when should you return true or false?

Answers

You can use CodeLens to keep working while investigating what went wrong with your code without leaving the editor. Code references, code modifications, connected bugs, work items, code reviews, and unit tests can all be found here.

What codelens button to see what is going on?

In Navigation History lists in Visual Studio Code, we can view the history of files that have been traversed. By just hitting Ctrl + Tab, you can get this window from the “Goto-> Navigation History” menu. This will provide a list of all files that have been previously visited in Visual Studio Code.

With the aid of a special visualization tool, you can also run Python code in addition to active code. You can direct a program's step-by-step execution with the codelens tool.

Therefore, Additionally, it enables you to view all variable values as they are generated and changed.

Learn more about codelens here:

https://brainly.com/question/29918362

#SPJ1

What allows a programmer to write code quickly and efficiently for an action that must be repeated?.

Answers

Answer:

iteration - loops

Explanation:

what type of signature is created when a person signs his or her name on a pen pad and the signature is automatically converted and affixed to a computer document?

Answers

A digital signature is created when a person signs his or her name on a pen pad and the signature is automatically converted and affixed to a computer document.

What is a document?

Generally speaking, a document is a permanent record of information that a user may access at a later time. In a document storage system, a full document or specific sections of it can be regarded as distinct data elements. Here are some typical illustrations of documents: letters.

Which four types of documents are there?

Tutorials with a learning focus are one of the four categories of documentation.

how-to manuals with a purpose.

conversations that focus on understanding.

informational sources of reference.

To know more about the document visit:

https://brainly.com/question/20696445

#SPJ4

What is the difference between an app and an application?
A. an app is multi-purpose hardware and an application is hardware designed for a single purpose
B. an app is hardware designed for a single purpose while an application is multi-purpose hardware
C. an app is multi-purpose software and an application is software designed for a single purpose
D. an app is software designed for a single purpose and an application is multi-purpose software

Answers

Answer:

C. an app is multi-purpose software and an application is software designed for a single purpose

6. Why don't WE need to know exact IP addresses for the devices that we use?

Answers

Answer:

We don't need to know the exact IP addresses for the devices that we use because our devices use a network such as the internet to communicate with each other, and the network itself is responsible for routing the data between devices using their IP addresses. When we use our devices to access a network, the network assigns our device a temporary IP address, which is used to identify and communicate with our device within the network. This means that we only need to know the IP address of the network itself, rather than the specific IP addresses of all the devices that we use.

Games only recently became a part of human life—in about 1100 CE. A. True B. False

Answers

Modern video games are built on the foundation of historical ideas and concepts that date back thousands of years.

What Games only recently became a part of human life?

In the course of human history, only recently—around 1100 AD—have games become a part of daily life. It can be mental, emotional, or even physical when we relate to a story.

This game was created by the Assyrians more than 5000 years ago. It was a board game where players moved pieces around a board that represented a course. This game has been preserved at a London museum.

Therefore, it is false that games only recently became a part of human life—in about 1100 CE.

Learn more about games here:

https://brainly.com/question/3863314

#SPJ1

write a expression that results in a string consisting of the third throurh tenth charachters of the string s

Answers

Checking whether a string solely contains alphabetical characters requires the usage of the Python isalpha() string function. I.e., isalpha() determines whether a string is entirely composed of letters.

What is Python isalpha() string function?If a string contains solely alphabetical characters, it can be determined using the Python isalpha() string function I.e., isalpha() determines whether a string is made up entirely of letters.The isalpha() function in Python returns the Boolean value True if every character in a string is a letter and the Boolean value False otherwise. A space in a string will cause the method to return False since in Python, a space is not an alphabetical character.The isalpha() syntax looks like this:

string name.isalpha()

The method is instead added to the end of a string value or a variable that contains a string.

To Learn more About Python isalpha() string function  refer to:

https://brainly.com/question/15178292

#SPJ4

A manager is using the organization’s erp software to generate a report that links its human resources data to its overall financial performance. What is one type of hr data that the erp accounting module could factor into this report?.

Answers

It is to be noted that if a manager is using the organization’s ERP software to generate a report that links its human resources data to its overall financial performance. The one type of HR data that the ERP accounting module could factor into this report is: "Employees' Reason for Leaving"

What is the relationship between Employees Leaving and the company's financial performance?

According to research, firms with high employee engagement outperform in customer satisfaction, productivity, operational efficiency, and profitability, with the added benefit of safer, healthier employees with decreased absenteeism and attrition.

Employees that are overworked face significant levels of stress, which reduces their efficacy and production. Poor financial performance are closely tied to low productivity. As a result, staff turnover is frequently linked to poor financial performance.

Learn more about ERP Software:
https://brainly.com/question/15504006
#SPJ1

what is source code? group of answer choices any proprietary software licensed under exclusive legal right of the copyright holder. any software whose source code is made available free for any third party to review and modify. contains instructions written by a programmer specifying the actions to be performed by computer software. consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate.

Answers

It is to be noted that a source code is "any proprietary software licensed under the exclusive legal right of the copyright holder." (Option A)

Why is source code important?

Source code meets the requirements of businesses that have procedures in place that they want to keep independent of the program deployed. Some businesses view source code as a means to ensure that the software evolves as their business's demands change in the future.

There are several forms of source code. Proprietary software is software that is licensed under the copyright holder's exclusive legal right, and the source code for this sort of software is often not made available to the public. Open-source software, on the other hand, is software whose source code is made freely available for any third party to inspect and alter.

Learn more about Source Code:
https://brainly.com/question/14879540
#SPJ1

_____ is the name of an approach to building applications and services specifically for a cloud computing environment.

Answers

Answer:nat

Explanation:

one way to segment a market is according to whether the purchaser is a consumer or a business-to-business user. t or f

Answers

True, one way to segment a market is according to whether the purchaser is a consumer or a business-to-business (B2B) user.

What is B2B?

This type of market segmentation is based on the end user of the product or service, and it allows companies to tailor their marketing and sales efforts to specific types of customers.

Consumer market segments typically consist of individual consumers who purchase goods or services for personal use, while B2B market segments consist of businesses or organizations that purchase goods or services for use in their operations.

By segmenting the market in this way, companies can create more targeted marketing campaigns and sales strategies, which can help increase their chances of success in the market.

To Know More About B2B, Check Out

https://brainly.com/question/20514029

#SPJ1

The game Just Dance involves players copying the dance moves of the actors in the game. What kind of game mode does Just Dance use? A. turn-based game mode B. card-based game mode C. King of the Hill game mode D. movement game mode

Answers

Answer: The answer is D. Movement game mode

Explanation: The answer can't be A because there are no turns to be taken in the game. The answer cant be B because it is not a card game. The answer cant be C because there is no hill to dominate within the game only your opponents to crush with your dance moves. That leaves D as the answer.

Hope this helped!

"Don't have a good day, have a great day!"

- Blue shirt guy

which permission does a user need to set security permissions for a folder that exists on an ntfs partition?

Answers

If a folder exists on an NTFS partition, the permission which a user need to set security permissions on the folder is: 2) full control.

what is a folder?

A folder is a document that is often used to store and organize a file on a computer system, according to computer technology.

NTFS: What is it?

The term "NTFS" stands for "new technology file system," and it is one of the file systems that Windows 10 computer systems advocate using on a local hard disk because it provides a high level of security by restricting unauthorized access to data based on a set of permissions.

To sum up, an end user would require full control access in order to be given the ability to set security permissions on a folder that already exists on an NTFS disc.

your question is incomplete, but most probably the full question was

If a folder exists on an NTFS partition, which permission does a user need to set security permissions on the folder?

1)read

2)full control

3)execute

4)write

Find out more about NTFS here: brainly.com/question/12212187

#SPJ4

Which programming language type is the most basic human-readable and closest to actual machine language?.

Answers

Answer:

Assembly Language

Explanation:

Please Help! (Language=Java) This is due really soon and is from a beginner's computer science class!
Assignment details:
CHALLENGES
Prior to completing a challenge, insert a COMMENT with the appropriate number.

1) Get an integer from the keyboard, and print all the factors of that number. Example, using the number 24:

Factors of 24 >>> 1 2 3 4 6 8 12 24
2) A "cool number" is a number that has a remainder of 1 when divided by 3, 4, 5, and 6. Get an integer n from the keyboard and write the code to determine how many cool numbers exist from 1 to n. Use concatenation when printing the answer (shown for n of 5000).

There are 84 cool numbers up to 5000
3) Copy your code from the challenge above, then modify it to use a while loop instead of a for loop.

5) A "perfect number" is a number that equals the sum of its divisors (not including the number itself). For example, 6 is a perfect number (its divisors are 1, 2, and 3 >>> 1 + 2 + 3 == 6). Get an integer from the keyboard and write the code to determine if it is a perfect number.

6) Copy your code from the challenge above, then modify it to use a do-while loop instead of a for loop.

Answers

Answer:

For challenge 1:

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       // Get an integer from the keyboard

       Scanner scanner = new Scanner(System.in);

       System.out.print("Enter an integer: ");

       int num = scanner.nextInt();

       // Print all the factors of the integer

       System.out.print("Factors of " + num + " >>> ");

       for (int i = 1; i <= num; i++) {

           if (num % i == 0) {

               System.out.print(i + " ");

           }

       }

   }

}

For challenge 2:

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       // Get an integer from the keyboard

       Scanner scanner = new Scanner(System.in);

       System.out.print("Enter an integer: ");

       int n = scanner.nextInt();

       // Count the number of cool numbers from 1 to n

       int coolCount = 0;

       for (int i = 1; i <= n; i++) {

           if (i % 3 == 1 && i % 4 == 1 && i % 5 == 1 && i % 6 == 1) {

               coolCount++;

           }

       }

       // Print the result using concatenation

       System.out.println("There are " + coolCount + " cool numbers up to " + n);

   }

}

For challenge 3:

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       // Get an integer from the keyboard

       Scanner scanner = new Scanner(System.in);

       System.out.print("Enter an integer: ");

       int n = scanner.nextInt();

       // Count the number of cool numbers from 1 to n using a while loop

       int coolCount = 0;

       int i = 1;

       while (i <= n) {

           if (i % 3 == 1 && i % 4 == 1 && i % 5 == 1 && i % 6 == 1) {

               coolCount++;

           }

           i++;

       }

       // Print the result using concatenation

       System.out.println("There are " + coolCount + " cool numbers up to " + n);

   }

}

For challenge 5:

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       // Get an integer from the keyboard

       Scanner scanner = new Scanner(System.in);

       System.out.print("Enter an integer: ");

       int num = scanner.nextInt();

       // Determine if the integer is a perfect number

       int sum = 0;

       for (int i = 1; i < num; i++) {

           if (num % i == 0) {

               sum += i;

           }

       }

       if (sum == num) {

           System.out.println(num + " is a perfect number.");

       } else {

           System.out.println(num + " is not a perfect number.");

       }

   }

}

For challenge 6:

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       // Get an integer from the keyboard

       Scanner scanner = new Scanner(System.in);

       System.out.print("Enter an integer: ");

       int num = scanner.nextInt();

       // Determine if the integer is a perfect number using a do-while loop

       int sum = 0;

       int i = 1;

       do {

           if (num % i == 0) {

               sum += i;

           }

           i++;

       } while (i < num);

       if (sum == num) {

           System.out.println(num + " is a perfect number.");

       } else {

           System.out.println(num + " is not a perfect number.");

       }

   }

}

which symbol is used in standard sql as a wildcard to represent a series of one or more unspecified characters?

Answers

% (percent sign) is the symbol is used in standard sql as a wildcard to represent a series of one or more unspecified characters.

What is Wildcard in SQL?

A wildcard character replaces one or more characters in a string. The LIKE operator employs wildcard characters. In a WHERE clause, the LIKE operator is used to look for a specific pattern in a column.

What is SQL?

Structured query language (SQL) is a programming language used to store and process data in relational databases. A relational database is a tabular database that stores information in tabular form, with rows and columns representing different data attributes and the various relationships between the data values. SQL statements can be used to store, update, delete, search, and retrieve data from a database. SQL can also be used to maintain and improve database performance.

To know more about SQL, visit: https://brainly.com/question/25694408

#SPJ4

Other Questions
Choose two different visual media items that express opinions about trade agreements, barriers to trade or free trade. The resource list provides some examples of visual media and guidance on where to locate them on the Internet. Be sure to include the media item, or directions on how to access it, with your assessment. Make a note of the key events and ideas evident in the item, the creator and date of origin, and be sure to read any captions or quotes that are included.Analyze the message delivered by each of your visual media items. For each item, respond to the following questions in complete sentences. Cite evidence from the resource and the lesson to justify your responses. What is the issue discussed in the visual media item you chose? What is the creators viewpoint on the issue? What details in the resource support the authors claim? Provide evidence from the item to support your response. Does this viewpoint reflect a commitment to free trade or to protectionism? Explain your answer and include evidence from the item to support your response. Do you agree or disagree with the viewpoint of the item you chose? Why or why not?Respond to the following reflection questions based on your understanding of free trade and protectionism. What are two benefits and two costs of free trade? What is protectionism and why would a country base trade policy on it? Explain at least two reasons. What is the classification of each system? Drag the answers into the boxes to match each system. Put responses in the correct input to answer the question. Select a response, navigate to the desired input and insert the response. Responses can be selected and inserted using the space bar, enter key, left mouse button or touchpad. Responses can also be moved by dragging with a mouse. {4x+y=8 x+3y=8 consistent independent Estimates suggest that approximately _____% of people in the United States suffer from a mental disorder at some point in their lifetime. Consider the following methods, which appear in the same class.public int function1(int i, int j){return i + j;}public int function2(int i, int j){return j - i;}Which of the following statements, if located in a method in the same class, will initialize the variable x to 11?A int x = function2(4, 5) + function1(1, 3);B int x = function1(4, 5) + function2(1, 3);C int x = function1(4, 5) + function2(3, 1);D int x = function1(3, 1) + function2(4, 5);E int x = function2(3, 1) + function1(4, 5); Which laboratory activity involves a chemical change?leaving a copper penny in vinegar until it turns greenboiling saltwater for several minutes until only solid salt remainsextracting iron filings from a sand mixture using a magnetcrushing a rock with a hammer to extract mineral deposits Does anyone know the answer? Fig the function shown in the table below, which of the following is its average fate of change ever the interval 2x101.3/42.-23.-1/24.-3./22. What is the average rate of change of g(x)=x on the interval 3x9(1) 8(3) 15(2) 12(4) 183. Given the function f(x) shown graphed below, what is its average rate of change from } x=1 to x=7 ? (1) -1(2) -4/3(3) 8(4) 3/54. A function h(x) has an average rate of change equal to 7 on the interval 5 x 9. If h(5)=12, then which of the following must be the value of h(9) ? herb kelleher, former president and ceo of southwest airlines, was known for seeing the good in people and believing in favorable results. which of the following characteristics best describes this trait of kelleher? Choose the correct punctuation: (ELA.9.C.3.1)Group of answer choicesHarrison had to wear a red rubber ball for a nose, and keep his eyebrows shaved off, and cover his even white teeth with black caps at snaggle-tooth random, he essentially looked like a walking clown.Harrison had to wear a red rubber ball for a nose; keep his eyebrows shaved off; and cover his even white teeth with black caps at snaggle-tooth random; he essentially looked like a walking clown.Harrison had to wear a red rubber ball for a nose, keep his eyebrows shaved off, and cover his even white teeth with black caps at snaggle-tooth random; he essentially looked like a walking clown.Harrison had to wear a red rubber ball for a nose, keep his eyebrows shaved off; and cover his even white teeth with black caps at snaggle-tooth random. he essentially looked like a walking clown. Tyshawn took a taxi from his house to the airport. The taxi company charged a pick-up fee of $2.50 plus $3.50 per mile. The total fare was $79.50, not including the tip. Which equation could be used to determine mm, the number of miles in the taxi ride? Most of the energy released in citric acid cycle reactions is conserved in ________. URGENT! Translate the sentence into an equation.The sum of 2 times a number and 3 is 9.Use the variable x for the unknown number. The price of a share of stock changed by -$19.20over a 5-day period. What was the average dailychange in the price of a share of the stock? Refer to Figure 18-12. If the world price of a baseball is $3 and a tariff of 51 per baseball is imposed in the United States, which area represents the aim tariff revenue the United States government collects?a. ab. bc. ed. f according to the text, critics working within the critical-cultural tradition are unapologetically subjective in their approach to scholarship. what is their goal? 8. assume you calculated a financial ratio variance of 2x the usual balance for accounts receivable. why did you calculate a financial ratio variance of 2x the usual balance? julia buys herself a new car, and now notices for more of the same model and color of car than she ever did before her purchase. this is an illustration of LA Unit 3B CFA (22-23)0 James Jareh6Use the sentence to answer the following question.The organization granted waivers to students from foreigncountries to attend the convention.Based on context, what would be the best synonym for the word organization?A ventureB consoleC institute#6 of 10 -D assurance What is the salinity of normal sea water? *A. about 35 parts per thousandB. about 40-45 parts per thousandC. about 17 degrees CelciusD. about 1.025 grams/ml Which of the following equations has an axis of symmetry with the equation x = 3?y=x + 6x-3y= 2x + 6x-3y=x - 6x +3y=3x + 6x-3